Edge computing can be a big revenue generator for companies, but adoption is lagging and the results vary according to which of four approaches is taken, new research from Accenture indicates.
IBM TechXchange underscores the importance of AI skilling and partner innovation
Generative AI and large language models are poised to impact how we all access and use information. But as organizations race to adopt these new technologies for business, it requires a global ecosystem of partners with industry expertise to identify the right enterprise use-cases for AI and the technical skills to implement the technology. During […]
Cisco significantly bolsters security portfolio with $28B Splunk buy
Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk. Founded in 2003, Splunk’s software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems. Network security teams can use this information to […]
How network security can save security dollars
For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, […]
Foundational models at the edge
Foundational models (FMs) are marking the beginning of a new era in machine learning (ML) and artificial intelligence (AI), which is leading to faster development of AI that can be adapted to a wide range of downstream tasks and fine-tuned for an array of applications. With the increasing importance of processing data where work is […]
UnaBiz Equips TotalEnergies Service Station Stores with 3,000 Temperature Sensors to Enhance Food Safety
UnaBiz Equips TotalEnergies Service Station Stores with 3,000 Temperature Sensors to Enhance Food Safety. TotalEnergies signs agreement with UnaBiz, Massive IoT service provider and integrator, to equip motorway service station stores with sensors to monitor the temperature control of refrigeration units. Today, more than 160 motorway service stations in the TotalEnergies network are equipped with […]
Leading IoT Industry Players Bring Implementation of Relay Utilizing LoRaWAN® to Market
A groundbreaking collaboration between LPWAN industry leaders and LoRa Alliance® members Semtech, Actility, Arad, and Deviceroy has the world’s first commercial implementation and successful end-to-end interoperability test for the innovative relay feature utilizing LoRaWAN connectivity. This cutting-edge advancement enables LoRaWAN packets from remote, isolated or hard to reach devices to be relayed by battery-operated relay […]
Digital Matter Enables Lowest-Cost IoT Asset Tracking at Scale with New Battery-Powered Tracking Device Range
The Barra range is Digital Matter’s new low-cost, low-power device family that enables affordable and flexible indoor/outdoor IoT asset tracking and recovery in supply chain, logistics, equipment management, and more. Digital Matter, leaders in low-power IoT asset tracking, today announced the expansion of their battery-powered IoT asset tracking portfolio with their new ‘Barra’ device family, […]
IoT startups fill security gaps
As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted. Even so, the scale of the […]
IBM X-Force: Use of compromised credentials darkens cloud security picture
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate. That’s one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year. “Over 35% […]